1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alona [7]
4 years ago
7

QUESTION 2

Computers and Technology
1 answer:
egoroff_w [7]4 years ago
6 0

Answer:

A java object that can be attached to or refer to more than one class.

Explanation:

<u>Definition</u>

The word Polymorphism means an object have many forms.

<u>Examples</u>

A man can be student at school, son at home and  employee at job.

<em>So according to the definition we can say that an object that refers to multiple classes for different purposes is called </em><u>polymorphism</u>

You might be interested in
Suggest ways in which web designers can use color to make a statement about the subject of a web page, a brand, or the website i
Ulleksa [173]

Hi. :")

As it is used to attract interest in advertisements, different colors can be used in order to attract attention here. Or the upper left corner technique can be used. The important contents are placed in the upper left corner. Because, in the country where I live, in the technology design class, people have always studied the upper left corner further.

Good Luck!

#Turkey

4 0
3 years ago
Select the correct answer.
liraira [26]
I think is the second one or the first one
5 0
3 years ago
Read 2 more answers
Explain how any simple substitution cipher that involves a permutation of the alphabet can be thought of as a special case of th
Kaylis [27]

A simple substitution cipher takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

<h3>What is the Hill cipher?</h3>

In 1929, the Hill cipher was invented by Lester S. Hill and it can be described as a poly-graphic substitution cipher that is typically based on linear algebra and it avails a cryptographer an ability to simultaneously operate on more than three (3) symbols.

In Cryptography, the simple substitution cipher is usually viewed as a function which takes each plaintext letter (alphabet) and assigns it to a ciphertext letter. Thus, it takes each vector (e_i) and assigns it to the vectors [e_{\pi (i)}] in a one-to-one function so as to make them equivalent.

Read more on Hill cipher here: brainly.com/question/13155546

#SPJ1

6 0
2 years ago
She wants to sort the list based on the names of the first four gas in ascending order. Which command group dose she navigate to
zubka84 [21]

<u>Best method to sort data:</u>

Best method to sort for data people use excel sheet.  If we have 4 quarter sales data of each select man wise.

1. Open the MS Excel

2. Create blank sheet

3. Create list of salesman and quarter sales in each cells from A1….

4. Select all whole worksheet and paste it the data

5. Once data is copied, custom list is created and select advanced options dialog box, select required field and sorting is achieved.

This is simple’s method for sort the list based on the names of the first four gas in ascending order.

7 0
3 years ago
Read 2 more answers
The spelling and grammar tools available with word-processing software will find all of the errors in your cover letter. true fa
love history [14]
False. One constant in the history of computers is that people can screw anything, no matter how "bulletproof", up.
8 0
3 years ago
Other questions:
  • Jerry suspects that information about his internet usage was sent to external websites without his knowledge. He is wary about t
    7·1 answer
  • An executive at an online video company wants to look over usage data from the previous month. The company has data from
    15·2 answers
  • When setting permissions on an object to Full Control, what otherpermissions does this encompass?Read, Write, Execute, and Modif
    13·1 answer
  • _______ is a form of crime that targets a computer system to acquire information stored on that computer system, to control the
    12·1 answer
  • What does “modulate your voice” mean?
    9·1 answer
  • Join Viber Creations on Viber https://invite.viber.com/?g2=AQAboWGw5hKZN009gOjCULc4cbWKWg42%2BIFmJoPC93MPlt9kstcpJyU6yagPh050 |
    6·1 answer
  • is a security design principle to direct the selection of control layers for an organization's computing enclave to ensure its r
    6·1 answer
  • Can some one please help
    9·1 answer
  • Certain country in the Caribbean Sea recently held an election to choose its president. Every vote cast was electronic, but unfo
    10·1 answer
  • Which organization provides a free, online html5 validator application to ensure that a webpage's html tags follow the rules for
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!